Sentry Web Protection: Ransomware’s Shield

sample web protection report

You don’t know what you don’t know. It’s as simple as that. Understanding risk is the first step in recognizing a security need. To succeed in battle, one must know their opponent. Studying data-breaches to find their origins has revealed some astounding numbers.

The Problem: Browser-Based Data Breaches

Recent studies have shown that hacking approaches have changed in recent years. They are exploiting a new weakness. About 54% of online data breaches now involve the use of an internet browser.

Internet browsers are the apps used to view the internet– such as Google Chrome or Mozilla Firefox. Let’s take a closer look at these newer, web-based threats to better understand our opponent.

Malicious Emails: Links vs Attachments

Standing in at 40%, emails containing malicious attachments account for the largest portion of online data breaches. Running a tight second, emails containing malicious links account for 37%. Combined, emails are accounting for over 2/3 of online data breaches. As astounding as those numbers may be, there is a subtle nuance between these two threats that needs to be clarified.

Email attachments must be downloaded before they are opened. arrive on your workstation via your Inbox or the specified download folder. Attachments but they Once clicked, th attempts to infect the system. Email links are merely strings of characters.

Once clicked, the link takes them to the threat, where infection occurs.

Don’t Take Our Word for It

Threat #3: Drive-By Downloads

16% of data breaches occur when unwanted, malicious software is unknowingly installed alongside another program. Once again, by running both Sentry AntiVirus and Web Protection, threats must now pass through multiple layers of defense in order to infect your system: